NCJ Number
35929
Journal
Security Management Volume: 20 Issue: 3 Dated: (JULY 1976) Pages: 30-32
Date Published
1976
Length
3 pages
Annotation
A BRIEF OUTLINE OF THE SECURITY MEASURES WHICH MAY BE TAKEN TO PROTECT AN ORGANIZATIONHS INFORMATION ASSETS AGAINST THREATS FROM WITHOUT AND ABUSE AND MANIPULATION FROM WITHIN.
Abstract
ORGANIZATIONS ARE INCREASINGLY DEPENDENT ON INFORMATION FILES, AND AS A RESULT, ARE INCREASINGLY LIABLE SHOULD THESE FILES BE COMPROMISED. SEVERAL MANAGEMENT DATA PROTECTION PLANNING CONSIDERATIONS ARE EXAMINED TO HELP ORGANIZATIONS AVOID THESE LIABILITIES. IT IS NOTED THAT THE SCOPE AND TYPE OF DATA, COLLECTION AND HANDLING PRACTICES, ACCESSIBILITY OF DATA, AND RETENTION OF DATA MUST BE EXAMINED FOR SECURITY PLANNING PURPOSES. DATA PROTECTION CONTROLS MAY THEN BE IMPLEMENTED IN THE FOLLOWING AREAS: HIRING AND ASSIGNMENT OF KEY PERSONNEL, ACQUISITION AND USE OF DATA, SENSITIVE DATA, TO THE DATA PROCESSING FACILITY, AND THE DUPLICATION AND DISTRIBUTION OF INFORMATION.